The Trojan horse in your pocket: How an innocent app can empty your bank account

 

El caballo de Troya en tu bolsillo: Cómo una app inocente puede vaciar tu cuenta bancaria

 

 

 

José Luis Hidalgo Torres

Process Management Engineer

Edwards Deming Corporate University Technological Institute

jlhidalgot@hotmail.com

https://orcid.org/0000-0002-4671-3116

 

 

 

 

 


 

ABSTRACT

In the digital age, mobile security is an extremely critical challenge given the growing proliferation of financial malware and sophisticated social engineering. This article explores how common mobile applications can contain sophisticated mechanisms for illegitimate financial extraction that exploit systematic abuses of critical permissions, overlay attacks, and stealthy credential capture. In summary, a combined static and dynamic analysis of malicious Android APKs is performed with the help of specialized tools such as Sandboxing, Wireshark, and permission analysis on Android devices. Common patterns of abuse of accessibility services and overlay techniques used to implement highly realistic banking interfaces are presented, with key examples of malware such as BianLian and SharkBot. With this approach to the threats presented and considering the options available to counter them. Strategies must be directed at users in executable ways, especially critical permission auditing and the identification of signs of social engineering. In conclusion, users must seek to protect themselves and application developers.

RESUMEN

En la era digital, la seguridad móvil es un desafío sumamente crítico dada la creciente proliferación de malware financiero y la sofisticada ingeniería social. Este artículo explora cómo las aplicaciones móviles usuales pueden contener mecanismos sofisticados para la extracción financiera ilegítima y que explotan abusos sistemáticos de permisos críticos, los ataques de superposición y la captura de credenciales de manera furtiva. En resumen, se realiza un análisis combinado, estático y dinámico, de APK maliciosas de Android, con la ayuda de herramientas especializadas, tal como Sandboxing, Wireshark, y el análisis de permisos en dispositivos Android. Se presentan los patrones comunes de abuso de los servicios de accesibilidad y las técnicas de superposición utilizadas para implementar interfaces bancarias con gran realismo, con ejemplos principales de malware, tal como BianLian y SharkBot. Con este enfoque respecto a las amenazas presentadas y considerando las opciones disponibles para contrarrestarlas. Las estrategias hay que direccionarlas a los usuarios en formas ejecutables, especialmente la auditoría crítica de permisos y la identificación de signos de ingeniería social. Para concluir, los usuarios deben buscar protegerse a sí mismos y los desarrolladores de la aplicación.

Keywords

Mobile security, banking malware, social engineering, application permissions, malware prevention.

Seguridad móvil, malware bancario, ingeniería social, permisos de aplicaciones, prevención de malware.

 

INTRODUCTION

In the age of hyperconnectivity, the smartphone has gone beyond its original function to become a crucial extension of everyday life. From the ability to communicate effectively to conducting financial transactions, accessing digital identities, and services provided, the smartphone is nothing more than a link between our digital and physical inaction. In line with this reality, it is reported that more than 7 out of 10 online banking and commercial transactions are conducted using mobile devices (Feedzai, 2025).

However, this growing dependence also creates vulnerabilities, mainly due to the uncontrolled proliferation of mobile applications. Many of these applications, even those that appear harmless and legitimate, such as calculators, games, and utilities, can hide malicious mechanisms that operate silently beneath their innocent appearance. This is where the metaphor of the "Trojan horse" comes in; they are a camouflaged and seemingly harmless threat, but in reality they can and are capable of emptying the user's bank account in a matter of seconds without them noticing.

The problem is exacerbated by the frequent neglect of good security practices, both by developers and users. From the engineering of applications that request excessive permissions without clear justification to users who accept without question, an environment conducive to the proliferation of mobile financial malware is created. Malware such as BianLian and SharkBot in particular have proven to be surprisingly efficient, combining advanced techniques to modify program code (obfuscation), abuse permissions, overlay interfaces, and use social engineering-based psychological manipulation to achieve their goals (INCIBE, 2025).

A phenomenon of this nature requires analysis that scrutinizes not only the technical nature of the malware in terms of how it works, what APK permissions it obtains, what type and complexity of obfuscation is applied, and the user profile. Social engineering plays a crucial role in making the attack work, and even though most users have basic training, they end up falling into the trap (Malwarebytes, 2025). For example, a malicious application that requires authorization for accessibility services may justify a reason for users with disabilities, but in reality it is used to load the legitimate bank interface and request credentials. Therefore, an interdisciplinary approach is taken and a comprehensive and up-to-date assessment of the threat of malicious financial applications on Android is proposed. Through technical analysis and analysis of the respective social impact, we seek to answer essential questions: How do these crimes work technically? What are the most critical vulnerabilities? What role do deception techniques play? And how can attacks be successfully prevented with publicly available tools and basic preparation? The main objectives are:

·      To describe in detail the technical characteristics and evolution vectors of the most recent and widespread malicious financial APKs.

·      To analyze the use and impact of social engineering in the promotion and effectiveness of these crimes.

To offer practical, zero-cost recommendations for users and developers that, when implemented, minimize risk and foster a culture of responsible defense against the malicious use of mobile devices. The aim is not only to raise awareness, but also to contribute concrete solutions to the challenge of preventing and mitigating a threat that, although less visible, has extreme financial and personal consequences for millions of users around the world.

Methodology

Taking a comprehensive approach to how malicious mobile applications that act as digital Trojan horses operate, a mixed methodological approach was adopted, focusing on technical malware analysis and a specialized documented review of the state of mobile financial threats. This mixed methodological approach allowed for the simultaneous analysis of the technical characteristics of malicious APKs and the contextualization of their impact based on the community's experience with the simultaneous use of certain computer security conventions and social engineering.

Representative samples of mobile banking malware such as BianLian and SharkBot, which are currently prevalent and high-profile in the computer security community, were selected for analysis. This malware has received considerable publicity in the community for extended periods due to its high technical sophistication, use of exceptional evasion measures, and high number of infections spread, having had an impact in multiple regions, including Europe, South America, and Asia (INCIBE, 2025), (SECURESOFT, 2022).

The samples used were obtained and validated through public repositories and security analysis databases certified by recognized entities in mobile threat research, ensuring their relevance and representativeness in the current threat landscape (SECURELIST, 2025), (Kaspersky, 2025). For example, platforms such as ThreatFabric and Kaspersky reports continuously document the activity and evolution of this malware, providing access to samples and behavior patterns that support the article (Infobae, 2025), (SECURELIST, 2025).

This ensures that the technical analysis is based on real, current, and representative evidence, allowing valid conclusions to be drawn that are applicable to the prevention of contemporary mobile financial attacks.

Static analysis is an essential methodology in mobile banking malware research, allowing the structure, code, and internal components of an application to be studied without the need to execute it, minimizing risks and facilitating the accurate identification of malicious elements (Rojo, 2020), (Rivera, 2014).

This analysis is based on reverse engineering techniques and the use of specialized tools that decompile the APK to extract valuable information about permissions, code, and integrated resources (UPS, 2025).

The main objective of static analysis is to identify indicators such as requested permissions, declared manifests, hidden components, suspicious text strings, and obfuscated code that reveal the malicious nature of the application (Ismael & Thanoon, 2022), (Rivera, 2014).

APK decompilation:

Tools such as APKTool and JADX are used to extract and examine the Android Manifest.xml file to identify permissions such as READ_SMS, SEND_SMS, SYSTEM_ALERT_WINDOW, and others that could be used to intercept communications or modify interfaces (Rojo, 2020).

Services and receivers operating in the background for malicious purposes are also identified (UPS, 2025).

String and Resource Analysis:

Extraction of text strings to detect URLs, IP addresses, commands, or data that point to connections with control and tracking servers (Appdome, Inc, 2025).

Java and Dalvik Code Review:

Manual and automatic inspection of calls to sensitive APIs, use of obfuscation techniques, dynamic encryption, and content loading in Web Views used for overlay attacks and credential theft (Gaviria, 2016), (Rivera, 2014).

Certificate validation:

Review of digital signatures to detect modifications or inclusion of unauthorized third-party components.

Native library analysis:

Where applicable, native code analysis is performed on files. Using disassemblers to detect low-level malicious instructions (Rojo, 2020).

Static analysis relies on the following tools, which are widely recognized in the malware analysis community:

·      APKTool for disassembling resources and manifests (Rivera, 2014).

·      JADX, JEB, CFR to decompile Dalvik byte code to readable Java code (Rojo, 2020).

·      Appdome for automation in static and dynamic analysis (Appdome, Inc, 2025).

·      Androguard for in-depth analysis with Python scripting (Gaviria, 2016).

·      Virus Total for scanning with multiple antivirus engines (Rivera, 2014).

Static analysis allows for the detection of known malware, performs permission audits, and understands the overall structure prior to execution; however, it is limited by advanced encryption and obfuscation techniques that make it difficult to read the code directly (Ismael & Thanoon, 2022), (Rivera, 2014).

For this reason, it is complemented by dynamic analysis to validate behaviors during execution (Rojo, 2020).

Static analysis facilitated the identification of characteristic patterns in financial malware such as BianLian and SharkBot, confirming their abuse of critical permissions and the incorporation of sophisticated techniques to camouflage their malicious activity.

Dynamic analysis is an essential part of the mobile banking malware analysis process, allowing the behavior of malicious software to be observed and controlled during its execution in a controlled environment, revealing actions and effects that are not detectable through static analysis (UPS, 2025), (Granado-Masid, 2012).

The purpose of this technique is to understand the actual functionality of the malware by monitoring its processes in real time, file system modifications, system calls, network communications, and other indicators of malicious activity (Granado-Masid, 2012), (University of Seville, 2020).

Creation of controlled environments (sandboxes):

A secure laboratory is set up, with isolated virtual machines that are not connected to the production network, to run the malware and prevent contagion or collateral damage. In this environment, real-world conditions are simulated to capture the natural behavior of the malware (UPS, 2025).

Monitored execution:

Monitoring tools are used to record activities such as file creation or deletion, registry changes, processes started, network calls, and resource usage. This detailed monitoring allows the malware's lifecycle and functionality to be mapped in real time (Granado-Masid, 2012).

Network traffic analysis:

Traffic generated by malware is captured to identify communications with command and control servers, transfer of stolen data, and possible mechanisms for updating or downloading additional payloads (University of Seville, 2020).

Instrumentation and debugging:

  Tools such as Frida allow functions to be intercepted and execution to be modified in order to discover hidden code or trigger specific behaviors on demand. Other debuggers and code analyzers, such as IDA Pro and Wireshark, complement the observation (Granado-Masid, 2012).

Tools used

Sandboxes (e.g., Cuckoo Sandbox, Appdome): to run malware in secure environments and manage results (Appdome, Inc., 2025).

Wireshark: for capturing and detailed analysis of network traffic (UPS, 2025).

Frida: for dynamic code instrumentation and runtime manipulation (Granado-Masid, 2012).

IDA Pro, OllyDbg: debuggers for in-depth analysis and code reversal (University of Seville, 2020).

Snort and other IDS: for pattern-based intrusion detection during simulation (University of Seville, 2020).

Dynamic analysis provides a comprehensive view of the actual behavior of malware, detecting malicious actions that remain hidden in static analysis. However, it is costly in terms of time and resources, and some malware includes anti-sandbox and anti-debugging techniques to avoid detection during this phase (Granado-Masid, 2012), (ESET AWARDS, 2017).

Samples of BianLian and SharkBot were run in a laboratory equipped with sandboxing and network monitoring techniques. Characteristic behaviors were observed, such as the superimposition of fake banking interfaces, the interception of SMS messages, and the automatic sending of credentials to remote servers, confirming and complementing the results of the static analysis (Rojo, 2020).

Social engineering is a fundamental technique that cybercriminals use to successfully compromise mobile devices with banking malware. This strategy is based on psychologically manipulating the user, causing them to compromise their security by downloading malicious applications or granting critical permissions. What is disturbing about this technique is that it can be carried out without directly breaching the system's technical defenses (Malwarebytes, 2025), (Kaspersky, 2025).

This type of attack plays on human requirements, such as trust, urgency, and fear, to manipulate the user into revealing sensitive information or performing actions that will benefit the attacker.

Some of the most common methods used are:

Phishing and smishing: Through emails or text messages that appear to come from a trusted entity, such as a bank, the user is invited to click on dangerous links or download applications that falsely promise solutions or urgent alerts (Godoy, 2024), (Infobae, 2025).

Vishing: In this case, the attacker makes phone calls posing as a bank employee or technician, with the aim of obtaining confidential data directly from the victim. (LISA Institute, 2025).

Identity theft and fraudulent websites: Here, attackers create websites or applications that perfectly mimic the original versions in order to capture credentials and private keys without the user noticing (IBM, 2022), (Malwarebytes, 2025).

Exploitation of accessibility services: Attackers request accessibility permissions under seemingly legitimate pretexts, but then use them for malicious activities, such as overlaying fake login screens that steal banking details (ABOUT FRAUD, 2025).

You have to be alert and cautious to avoid falling into these traps.

We have seen how NGate malware has caught the attention of experts such as ESET, as it combines social engineering techniques with advanced technical capabilities. In this case, victims receive fake SMS messages that appear to be official communications, leading them, without realizing it, to install malicious applications from external links. This allows attackers to access their banking details and contact list (ESET, 2024).

Another worrying case is that of Crocodilus malware, which is mostly spread through misleading social media campaigns and false advertising. Scammers trick users into downloading fraudulent applications by presenting them with attractive promises. Once the victim installs the application, the attackers manipulate permissions to gain remote control of the device, allowing them to empty people's bank accounts (Infobae, 2025).

Social engineering is more complicated than technical vulnerabilities, playing on human psychology, an issue that cannot be managed solely with technological systems. With this logic, user education and awareness are essential to reducing risks (Malwarebytes, 2025), (LISA Institute, 2025).

Attackers are very skilled at creating credible and urgent situations, which leads us to need a cultural change that encourages a critical and suspicious attitude towards unexpected requests. In addition, it is essential that we are rigorous in managing permissions and access in our mobile applications.

 

Results

An analysis of BianLian and SharkBot reveals a series of technical features and behaviors that explain how these malicious applications are so effective at draining bank accounts and evading traditional security systems.

Technical behavior and permission abuse

In BianLian and SharkBot, we can see that, from the moment they are installed, they request excessive permissions related to Android accessibility services. These permissions allow significant control over the device interface. Thanks to this abuse, the malware can create overlay windows that mimic the authentic screens of banking applications. This causes users, in a moment of carelessness, to enter their credentials and authorizations without realizing that they are being deceived (INCIBE, 2025).

In addition, this malware has been found to have particularly invasive functions. It can record keystrokes, capturing sensitive information entered by the user. It also has the ability to intercept and hide SMS messages, including authentication codes, facilitating unhindered access to accounts. Another tactic they use is to execute USSD commands, allowing them to check balances or perform operations without the user's consent.

To add an extra level of control, they can lock the device's screen while carrying out the attack, making it difficult for the victim to detect or interrupt. Finally, they have the ability to download and execute additional payloads, allowing them to extend the damage caused or maintain their presence on the device remotely.

Advanced evasion techniques

Both types of malware have developed very ingenious techniques to evade detection and analysis. For example, they incorporate systems that allow them to evade antivirus software and have anti-analysis mechanisms that complicate the task of inspecting their behavior in sandbox environments. This makes it difficult for security solutions to recognize their signatures (La Vanguardia, 2022). In addition, they employ encryption in their code and use encrypted communication with their command and control servers, making them even more difficult to track and block by conventional security tools.

Modus operandi and infection vectors

Applications that harbor malware often disguise themselves as common and useful tools, such as currency calculators, file cleaners, or music players. In this way, they try to gain the user's trust in order to deceive them, something we have seen in cases such as SharkBot and BianLian. Furthermore, it is worrying that these malicious programs use phishing campaigns, fake advertisements, and manipulated positive reviews, all with the aim of infecting as many devices as possible (INCIBE, 2025), (La Vanguardia, 2022).

Once these malicious applications are installed and obtain the necessary permissions, they can take control of the device to perform harmful activities. On the one hand, they carry out attacks known as ATS (Automatic Transfer Systems), which allow them to make unauthorized transfers by exploiting vulnerabilities in multi-factor authentication systems. In addition, they can access and manipulate the user's bank accounts by connecting to money mule services managed by the attackers. All of this circumvents standard security procedures, such as adding new devices to a whitelist, further complicating fraud detection (INCIBE, 2025), (La Vanguardia, 2022).

Impact on users

Users and security experts have shared several worrying experiences regarding these attacks. Among the most common effects, many people have seen their accounts quickly emptied, resulting in considerable financial losses. In addition, during an attack, some have completely lost control of their devices, which can be distressing. It is also common for phones to become much slower than usual, and for users to suddenly notice an unexplained increase in data and battery consumption. Finally, users have reported receiving fraudulent notifications that block their legitimate interactions, further complicating the situation.

The findings indicate that mobile financial malware is becoming increasingly sophisticated, posing a real and growing threat to user security and the integrity of the digital financial system.

Of particular concern is the misuse of permissions to access accessibility services. This suggests that these malicious programs are exploiting existing vulnerabilities in the Android structure to maintain their presence and take control of users' devices.

This phenomenon reflects what has been warned about in global reports from 2024 and 2025, which document an alarming 102% increase in the number of users affected by mobile financial threats (Kaspersky, 2025).

While traditional attacks targeting PCs appear to be on the decline, the growing presence and use of mobile devices has led cybercriminals to shift their focus. These criminals are using increasingly sophisticated techniques, such as code obfuscation and encrypted communication, as well as detection schemes made more difficult by the use of artificial intelligence. This allows them to maintain greater resilience and effectiveness, as seen in malware such as BianLian and SharkBot (SECURELIST, 2025).

From a social engineering perspective, psychological manipulation plays a key role in the success of attacks. Cybercriminals are experts at disguising malicious applications as everyday tools. These applications are often accompanied by urgent messages, false security warnings, and misuse of permissions, which can deceive even those users who are aware of digital risks (Malwarebytes, 2025). This human aspect reveals that technological barriers alone are not enough to protect us. For this reason, it is vital to include educational and awareness strategies that help users develop critical thinking and a more cautious approach to digital security.

It is important to recognize that this research has some limitations. One of the main ones is the changing and constantly evolving nature of mobile malware, which can quickly alter its attack methods and strategies to evade detection. This means that our analysis will always be in the process of being updated. Furthermore, regional variations and attacks targeting specific groups were not explored. Therefore, it would be valuable for future articles to consider broader samples and longitudinal approaches, which would help us better understand how these threats spread and mutate over time.

In practice, this article suggests that the best way to address the challenges of mobile malware is to adopt an approach that includes multiple dimensions. This involves:

Developing secure applications, which means granting only the permissions that are strictly necessary and conducting rigorous audits of applications that are public.

It is essential to implement new technologies that use machine learning to detect unusual behavior and communication that could be hiding.

In addition, it is important to continuously educate users about social engineering. It is essential that they understand the risks they face, know how to identify warning signs, and responsibly manage permissions on their mobile devices, contributing to a better defense against malware.

Mobile platforms and app stores need to strengthen their regulations to carry out more rigorous review and certification of apps to prevent malicious apps from entering the market.

In summary, we have a complicated landscape where technical failures, increasingly sophisticated malware, and human vulnerabilities are intertwined. To address this situation, it is essential to foster collaboration between different disciplines, drive technological innovation, and maintain continuous education for society. This will enable us to effectively address these stealthy technological challenges.

Conclusions

This article clearly shows how malicious mobile applications have become a veritable digital "Trojan horse," putting the financial security of millions of users at risk. By combining advanced social engineering techniques with the misuse of crucial permissions in the Android operating system, malicious programs such as BianLian and SharkBot are able to circumvent traditional security protections. As a result, they steal banking credentials directly, forge legitimate interfaces, and even carry out financial transactions without users' consent. This poses a serious challenge to the protection of our personal and financial information in the digital world.

The article makes us reflect on the importance of security on mobile devices from a broad perspective, focusing not only on technology but also on people's behaviors and decisions. It is essential that developers and users be responsible when granting permissions to applications. This, along with the use of effective tools to detect and monitor potential threats, could help significantly reduce the associated risks. In addition, promoting ongoing education about social engineering is essential to empower users to recognize and avoid these threats, thus protecting their personal and financial information in an increasingly complex digital environment.

In conclusion, it is essential that more rigorous regulations and oversight be implemented in mobile app markets. It is also crucial to encourage collaboration between the public and private sectors to lessen the negative impact of these threats on today's digital economy. This will allow us to protect our data and create a more secure environment for managing finances from mobile devices.

References

About Fraud. (2025). ThreatFabric - Fraud Solution Profile: https://www.about-fraud.com/providers/threatfabric/

Appdome, Inc. (2025). Mobile Application Security. Mobile Application Security Without the Headaches: https://www.appdome.com/mobile-app-security/?utm_medium=ppc&utm_term=mobile%20app%20security&utm_campaign=LATAM_Ecuador_Mobile_Security_Fraud_Security&utm_source=adwords&hsa_kw=mobile%20app%20security&hsa_cam=20273166694&hsa_ver=3&hsa_acc=5868061849&hsa_a

ESET. (2024). Discover malware for Android that relays NFC traffic to steal money from victims at ATMs: https://www.eset.com/py/acerca-de-eset/sala-de-prensa/comunicados-de-prensa/articulos-de-prensa/eset-descubre-un-malware-para-android-que-retransmite-trafico-nfc-para-robar-dinero-de-las-victimas-en-cajeros-automaticos/

Feedzai. (2025). Malware analysis: SharkBot: https://www.feedzai.com/es/material/analisis-de-malware-sharkbot/

Gaviria, P. (2016). Re-Unir. Application of Malware Methodology for the Analysis of the Advanced Persistent Threat (APT) "Poison Ivy": https://reunir.unir.net/bitstream/handle/123456789/4738/GAVIRIA%20%2C%20PABLO%20ANDRES.pdf?sequence=1&isAllowed=y

Godoy, L. (2024). El Comercio. Cyberattacks Using Social Engineering: https://www.elcomercio.com/opinion/ciberataques-ingenieria-social-lorena-naranjo-columnista/

Granado-Masid, A. (2012). Reunir - Digital repository. Application of a malware analysis methodology to a sample of ransomware: https://reunir.unir.net/handle/123456789/12261

IBM. (2022). What is social engineering?: https://www.ibm.com/es-es/topics/social-engineering

INCIBE. (2025). Incibe_National Cybersecurity Institute. Sharkbot: https://www.incibe.es/servicio-antibotnet/info/Sharkbot

Infobae. (2025). New security threat on Android: this is the malware that targets bank accounts: https://www.infobae.com/tecno/2025/06/30/nueva-amenaza-de-seguridad-en-android-asi-es-el-malware-que-va-tras-las-cuentas-bancarias/

Ismael, M. F., & Thanoon, K. H. (2022). ResearchGate. https://doi.org/https://doi.org/10.1109/CCTR1061903.2022.10031608

Kaspersky. (2025). What is social engineering?: https://latam.kaspersky.com/resource-center/definitions/what-is-social-engineering

La Vanguardia. (2022). Technology. Malicious apps - You should delete these 35 apps from your Android: https://www.lavanguardia.com/tecnologia/20220819/8473935/deberias-eliminar-35-aplicaciones-android-pmv.html

LISA Institute. (2025). Practical Guide to Social Engineering: https://www.lisainstitute.com/blogs/blog/guia-practica-ingenieria-social

Malwarebytes. (2025). What is social engineering? | How to protect yourself: https://www.malwarebytes.com/es/social-engineering

ESET Awards. (2017). Machine learning: Malware analysis and evasion using a heuristic approach: https://premios.eset-la.com/universitario/pdf/machine-learning-analisis-evasion-malware.pdf

Rivera, R. (2014). Polytechnic University of Madrid. Analysis of static characteristics of executable files for malware classification: https://oa.upm.es/34343/1/TFM_RICHARD_RIVERA.pdf

Rojo, A. (2020). University of Valladolid. Mobile application analysis platform: https://uvadoc.uva.es/bitstream/handle/10324/43269/TFG-G4449.pdf;jsessionid=3AFBD818C74F14396B72DC4CC7A9836E?sequence=1

SECURELIST. (2025). Crimeware and financial cyber threats in 2025: https://securelist.lat/ksb-financial-and-crimeware-predictions-2025/99268/

SECURESOFT. (2022). News - News, alerts, and reports to help you stay informed. New Sharkbot Malware Activity: https://www.securesoftcorp.com/w/novedades/ss_alerta693

University of Seville. (2020). University of Seville. Dynamic Malware Analysis 2020: https://biblus.us.es/bibing/proyectos/abreproy/94086/fichero/TFG-4086+Aroca+P%C3%A1ez.pdf

UPS. (2025). Salesian Polytechnic University - Cuenca Campus. Methodology for malware analysis in a controlled environment: https://dspace.ups.edu.ec/bitstream/123456789/14202/1/UPS-CT006985.pdf